Katie Moussouris Email and Phone Number
Katie Moussouris work email
- Valid
- Valid
- Valid
Katie Moussouris personal email
- Valid
I am the founder and CEO of a bootstrapped & profitable security company called Luta Security, where we specialize in helping businesses and governments work with hackers to better defend themselves from digital attacks, building sustainable Bug Bounty programs and vulnerability disclosure programs.I am a noted authority on vulnerability disclosure & bug bounties. I advise companies, lawmakers, & governments on the benefits of hacking & security research to help make the internet safer for everyone. I am a hacker - first hacking computers, now hacking policy & regulations.I sit on three Federal cyber advisory boards: DHS/CISA’s Cyber Safety Review Board, NIST’s Information Security and Privacy Advisory Board, and Commerce’s Information Security Technical Advisory Council.I helped the US Department of Defense start the government's first bug bounty program, called "Hack the Pentagon." My earlier Microsoft work encompassed industry-leading initiatives such as Microsoft's bug bounty programs & Microsoft Vulnerability Research. I am also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). I am a visiting scholar with MIT Sloan School,doing research on the vulnerability economy and exploit market, a New America Foundation Fellow, and Harvard Belfer Affiliate. I serve on the CFP review board for RSA, O'Reilly Security Conference, Shakacon, and am an advisor to the Center for Democracy and Technology.I am a frequent public speaker, all speaker requests please use press@Lutasecurity.com
Luta Security
View- Website:
- lutasecurity.com
- Employees:
- 3
-
Founder And CeoLuta Security Mar 2016 - PresentI've launched a new security startup company called Luta Security, named for the island in the Northern Marianas where my mother was born. We specialize in the deep business management of vulnerability disclosure programs and bug bounty programs for governments and complex organizations.After launching Microsoft's and the US Department of Defense's first bug bounty programs, the industry's first vulnerability coordination maturity model, and helping many others realize the benefits of working with hackers, I'm ready to help even more people and governments worldwide in policy, vulnerability coordination, and bug bounties. -
Chief Policy OfficerHackerone May 2014 - Mar 2016San Francisco, California, UsAs Chief Policy Officer of HackerOne, I oversee the company's philosophy and approach to vulnerability disclosure, advise customers and researchers, and work toward the public good to legitimize and promote security research to help make the Internet safer for everyone. -
Senior Security Strategist LeadMicrosoft Sep 2010 - May 2014Redmond, Washington, UsI ran the Security Community Outreach and Strategy team for Microsoft as part of the Microsoft Security Response Center (MSRC) team to help drive crucial elements of our security community strategy effort. • I created the first Microsoft security bounty programs (www.microsoft.com/bountyprograms). We paid over $253,000 and received 18 vulnerabilities and new attack techniques to help us build stronger defenses that will protect the entire platform from this new class of attack. • Serve as lead subject matter expert in the US National Body for the ISO work item 29147 "Vulnerability Disclosure", published in 2014. • I am the editor of a new International Standard ISO 30111 Vulnerability handling processes, published in 2014, which outlines the steps vendors need to take in order to investigate, triage, and remediate vulnerabilities in products of online services.• Owner of vulnerability disclosure policy for Microsoft in terms of overall strategy, evolution, policy creation, messaging, and I serve as the external spokesperson for all disclosure-related matters for Microsoft. • Drove an industry-wide shift in disclosure terminology and practice, winning the support of dozens of researchers, vendors, CERTs and other industry notables in the process. http://blogs.technet.com/b/ecostrat/archive/2010/07/22/coordinated-vulnerability-disclosure-bringing-balance-to-the-force.aspx• Drove a new reward for defensive security research incentives with the BlueHat Prize (www.bluehatprize.com), which paid over $260,000 to security researchers to design novel defensive mitigation technology.• Seasoned security spokesperson with nearly a decade of corporate spokesperson experience. I have appeared on the Engadget show, in numerous print media, as well as done audio and video podcasting. Media outlets I have been quoted in include BBC, Reuters, ComputerWorld, ComputerWeekly, ThreatPost, Ars Technica, Dark Reading, ZDNet, eWeek, Engadget, and others. -
Senior Security StrategistMicrosoft Sep 2008 - Sep 2010Redmond, Washington, UsI have joined the Security Development Lifecycle (SDL) team to help drive crucial elements of our SDL outreach effort. My primary responsibility is managing our relationships with security consulting and training partners in the SDL Pro Network. I am additionally tasked with ongoing analysis of the SDL – with a goal of assisting industry verticals that are looking to apply the SDL in critical computing scenarios. I continue to serve as lead subject matter expert in the US National Body for the ISO work item 29147 "Responsible Vulnerability Disclosure". -
Security StrategistMicrosoft Apr 2007 - Aug 2008Redmond, Washington, UsAt Microsoft, I have created and lead several new programs that expand the mission and capabilities of the Microsoft Security Response Center, including but not limited to: • Defend The Flag (DTF) training program: Trains IT Professionals on the basics of attack and Windows defense • Microsoft Vulnerability Research (MSVR): Formalizes Microsoft’s Responsible Disclosure of third-party vulnerabilities and establishes our role in protecting customers at the platform level. • Acted as subject matter expert on Responsible Disclosure and CVSS on behalf of Microsoft. • Established a role as a Trusted Advisor and cross-group liaison both within Microsoft and externally with researchers, partners, and customers. • Leveraged technical security background and consulting skills to bring true risk assessment to the Ecosystem Strategy Team. -
Lead Technical ArchitectSymantec Mar 2006 - Apr 2007San Jose, California, UsI continue to provide Application Security Assessments, penetration testing, architecture and code reviews, and business development for Symantec Professional Services.I also developed and oversee the Symantec Vulnerability Research Program:http://www.symantec.com/research -
Principal Security ConsultantSymantec Oct 2004 - Feb 2006San Jose, California, UsI joined the company formerly known as @stake, prior to its purchase by Symantec, as a Senior Security Architect specializing in application security. I have performed application penetration testing, software design and code reviews, while developing long term strategic partnerships with our clients. -
Senior Security Architect@Stake Mar 2004 - Oct 2004• Conducted web application, network and product penetration testing.• Conducted other security assessments such as application architecture reviews, source code audits, secure host builds, social engineering, etc. • Served as technical lead for large, complex engagements for Fortune 100 companies. • Mentored other consultants in career and technical development areas.
-
Senior Security Consultant2000 - Mar 2004Performed independent security consulting for clients throughout the San Francisco Bay Area. Industries in which I performed security consulting services include finance, health care, online commerce, networking technology, and software design.
-
Senior Security ConsultantIntrusion 2001 - 2002Plano, Texas, Us• Developed automated test suites for Intrusion Detection Software.• Developed client-server simulated exploitation using Hailstorm 1.0’ Fault Injection Testing, including entire TCP-IP handshake. -
Security Software EngineerTurbolinux 1999 - 2000Tokyo, Jp• Developed the first Security Response Program at TurboLinux.• Began customer security update mailing lists, and established the first security advisory release and proactive security information concerning upcoming updates to the bugtraq mailing list.• Evaluated TurboLinux operating system’s exposure to emerging security threats and vulnerabilities and responded accordingly.• Rolled patches into rpm packages and updated security download center for customers. -
Systems ManagerMit 1998 - 1999Cambridge, Ma, Us• Managed IT for the Department of Aeronautics and Astronautics.• Developed IT budget and infrastructure for support of current and future Aero-Astro Teaching Lab.• Responded to security incidents concerning the Department of Aeronautics and Astronautics. -
Systems AdministratorMit 1997 - 1998Cambridge, Ma, Us• Managed heterogeneous environment of Windows, Mac, and UNIX systems for the Whitehead Institute for Biomedical Research Genome Center at MIT (now known as the Broad Institute).• Maintained patch levels, designed and implemented network backup system, and performed disaster recovery and routine maintenance of all systems.• Contributed to design of new gene sequencing facility’s IT infrastructure. -
Genotyping Data ManagerMit 1995 - 1997Cambridge, Ma, Us• Part of one of the first bioinformatics teams worldwide.• Managed data analysis of all genotyping projects at the Whitehead Institute for Biomedical Research Genome Center at MIT.
Katie Moussouris Skills
Frequently Asked Questions about Katie Moussouris
What company does Katie Moussouris work for?
Katie Moussouris works for Luta Security
What is Katie Moussouris's role at the current company?
Katie Moussouris's current role is Entrepreneur Building Robust Vulnerability Disclosure & Supply Chain Coordination Programs With or Without Bug Bounties.
What is Katie Moussouris's email address?
Katie Moussouris's email address is k8****@****ail.com
What are some of Katie Moussouris's interests?
Katie Moussouris has interest in Quantum Teleportation, Security Vulnerability Research, Reverse Engineering, Secure Development Lifecycle.
What skills is Katie Moussouris known for?
Katie Moussouris has skills like Application Security, Security, Penetration Testing, Computer Security, Web Services, Web Application Security, Security Strategy, Information Security Management, Vulnerability Assessment, Disaster Recovery, Social Engineering, Cryptography.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial